...logged in or not
- Runs at system startup
- Only runs after 5 minutes of inactivity
- Automatically terminates mining processes when user resumes activity
- Detection for AES-ni capable CPU's
- Detection for when user is watching a movie or streaming video.
- Detection for when screen saver is active
- Designed for fast deployment on one or many

I need a freelancer to develop security scheme for iot
it is important that freelancer familiar wih AES, Zigbee and such topic in IoT
working software: Matlab , Omnet++
deadline limited
i need prototype from you how you will do it so i can award the best candiate .
please check the attachements, and let me know can u do it or not ?
i need first

1. Test all odd numbers in the range from 233 to
241 for primality using the Miller-Rabin test
with base 2
2. Encrypt the me...= 2 using RSA with
the following parameters
– n=56153, e = 23
3. Compute a private key (d, p, q) corresponding
to the public key
– Hint: p and q are in the above range
4. Decrypt the ciphertext obtained above using
the CRT

I want to create a local server with python in first script
Second script for a client that interacts with the server
Client script should have hanshaking with server and...first script
Second script for a client that interacts with the server
Client script should have hanshaking with server and exchanging keys
Everything should be encrypted with AES

The application should use openssl libraries. The user upload a file to encrypt/decrypt. The application can show the performance/metrics of encryption like time and memory. The user can select the different algorithm and mode on the application.

We want to run our own Email Service for business costumers.(Email Service Provider)
Very important is End-to-End Encryption. We want use implementations of AES, RSA, along with OpenPGP. Costumers should be able to register a Emailadresse with our service, and they should use our Webclient. Also there must be the poebillity that costumers can sync there

Hi,
I have some legal documents in Gujarati which require to be studied and report to be made.
If you have the experience in this type of work and good command in English...Gujarati which require to be studied and report to be made.
If you have the experience in this type of work and good command in English, please write to us.
With Regards,
aes.

I need a Computer Security Expert to write a step-wise implementation of AES Encryption in C++.
Only apply if you can complete in 1 day.
In this task, you will ask the user to tell input file name containing simple text, file name containing key, and out file name where stepwise output will be added.
Budget is fixed $30

Hi :)
My name is Boss, I'm looking Nodejs Developer to create/write function for me
It just only about Encrypt and Decrypt with DES-CBC
P.S. I have done this with PHP so i can send you example code in PHP

The application should use openssl libraries. The user upload a file to encrypt/decrypt. The application can show the performance/metrics of encryption like time and memory. The user can select the different algorithm and mode on the application.

Implemented hybrid encryption algorithm (AES+ EHC) to obtain:
• The average time for encryption/decryption for DES, AES, EHC and THE HYBRID ALGORITHM (EHC + AES).
• The memory consumption for each.
• Throughput consumption for each.
• The power consumption for each.
more information will be provide

1- Already have all music videos in MP4 format.
only need to play the file, don't need to sync music with lyrics.
2- Before the karaoke app, need a app to encrypt the mp4 so only the karaoke player can decrypt and
read.
3- The karaoke player
3.1- Main screen with music videos playing in background or MP3 with custom background when
waiting

...Stack<Queue<Character>> readSentences(String fileName): A method that
reads sentences from a textfile fileName separated by new line and builds a stack
of queues, where each sentence is represented by one Queue of characters. The first
sentence in the file must be at the top of the stack. The method must catch any
exceptions and return null if any

I have java code to perform encryption using newCipher(AES_GCM_ALGORITHM).
I need the same in Perl code. I can supply the java code and example.
The reason for this there...the java code and example.
The reason for this there is an application we use in Java and another in Perl.
The primary jobs are the Java will be encrypting and Perl has to decrypt.

1- Already have all music videos in MP4 format.
only need to play the file, don't need to sync music with lyrics.
2- Before the karaoke app, need a app to encrypt the mp4 so only the karaoke player can decrypt and read.
3- The karaoke player
3.1- Main screen with music videos playing in background when waiting for the user input karaoke song code

hi, i need to implement simple scheme in python. where there is sensors and aggregator. In each iteration each sensor will send its message which is number afer en...iteration each sensor will send its message which is number afer encrypt (FHE) add noise to its data. noise will be for privacy. the aggregator will calculate the sum and decrypt the sum.

hi, i need to implement simple scheme in python. where there is sensors and aggregator. In each iteration each sensor will send its message which is number afer e...iteration each sensor will send its message which is number afer encrypt (FHE) add noise to its data. noise will be for privacy. the aggregator will calculate the sum and decrypt the sum.

I need a freelancer to develop security scheme for iot
it is important that freelancer familiar wih AES, Zigbee and such topic in IoT
working software: Matlab , Omnet++
deadline limited
budget negotiated

...Stack<Queue<Character>> readSentences(String fileName): A method that
reads sentences from a textfile fileName separated by new line and builds a stack
of queues, where each sentence is represented by one Queue of characters. The first
sentence in the file must be at the top of the stack. The method must catch any
exceptions and return null if any

solve this one round aes problem.
a. Show the original contents of State, displayed
4 x 4 matrix
b. Show the value of State after initial
AddRoundKey
c. Show the value of State after SubBytes
d. Show the value of State after ShiftRows
e. Show the value of State after MixColumns

I need a good cracker who can decrypt the hash that i decrypted from my data file,
its bitcoin wallet by bitcoin core. Please no time wasters. I would see your portofolio first, skills and ability to the work. If you can't do please don't waste your time to bidding.
Note : i wont give you the [login to view URL] ONLY hash that i crypted frorm [login to view URL]

I have python code which I have to deliver to client.. Client should not be able to look at the code. Once we obfuscate they could not able to de-compile/decrypt the code.
Options: .exe
cx_freeze
pyminifier

Decrypt Database files. I need to be able to export all of the data a set of DBF database encrypted files? These file are purposely encrypted by the creators. Have you successfully decoded dbf files with heavy encryption, as a reverse engineer or database decoder?

I need someone who can decrypt an android apk and provide me the formula used for generating 2 header fields sent as http request.
It should be a 10 - 15 minute job for someone who knows how to do it. I am not looking for someone willing to learn and I will ignore bot bids.
Thanks.

Here is the deal :
1) Please follow the link to find two excel files: http...com/drive/folders/1NPB1dL20LdroK0ht1XSf0xzIVi9Rxxg1?usp=sharing
2) Find the password of the excel file or Decrypt the excel files
3) PM me once you have decrypted the file, the job will be assigned to you
4) Provide me with the password or decrypted file
5) Payment completed

...and public organizations to eradicate fraud and corruption, reduce cost and engage voters in a modern, convenient and accessible way.
From apps that encrypt, shuffle, and decrypt ballots to election supply chain tracking, Agora is building an entire ecosystem for voting. Thanks to our expertise and close collaboration over many years with governments

Hi,
We have a small Hungarian document which we require to translate from Hungarian to English.
If you are a Hungarian native with experience in this pair, please wri...Hungarian document which we require to translate from Hungarian to English.
If you are a Hungarian native with experience in this pair, please write to us.
With Best Regards,
aes.

Hi,
I have some English rhymes for kids to translate from English to Spanish.
If you are experienced in such translation especially to tune with the original rhymes,...rhymes for kids to translate from English to Spanish.
If you are experienced in such translation especially to tune with the original rhymes, please write to us.
With Regards,
aes.

I have 100's of encrypted alphanumeric strings 28 characters long and their results of 13 characters long. I can give you as many needed. 10,...28 characters long and their results of 13 characters long. I can give you as many needed. 10, 20, 100, etc. The goal is to figure out the method being used and how to decrypt other strings in the future.